Search results
Jump to navigation
Jump to search
Page title matches
- ...Cipher Modes of Operation" <ref>{{cite paper | title = Recommendation for Block Cipher Modes of Operation | publisher = National Institute for Standards & Technology | date = 2001 |8 KB (1,297 words) - 05:48, 8 April 2024
- 115 bytes (15 words) - 03:31, 23 May 2009
- Auto-populated based on [[Special:WhatLinksHere/Block cipher modes of operation]]. Needs checking by a human.597 bytes (79 words) - 11:25, 11 January 2010
Page text matches
- {{r|Block cipher modes of operation}}640 bytes (81 words) - 04:17, 27 April 2010
- Auto-populated based on [[Special:WhatLinksHere/Block cipher modes of operation]]. Needs checking by a human.597 bytes (79 words) - 11:25, 11 January 2010
- {{r|Block cipher modes of operation}}587 bytes (76 words) - 20:45, 11 January 2010
- {{r|Block cipher modes of operation}}657 bytes (85 words) - 17:19, 11 January 2010
- {{r|Block cipher modes of operation}}618 bytes (78 words) - 17:06, 11 January 2010
- ...put a block of ciphertext of the same size. Block ciphers are used in a [[Block cipher modes of operation|mode of operation]] to implement a cryptosystem.4 KB (546 words) - 05:48, 8 April 2024
- ...Cipher Modes of Operation" <ref>{{cite paper | title = Recommendation for Block Cipher Modes of Operation | publisher = National Institute for Standards & Technology | date = 2001 |8 KB (1,297 words) - 05:48, 8 April 2024
- Code book attacks can be used against any block cipher [[Block cipher modes of operation | mode of operation]].6 KB (1,064 words) - 02:04, 24 January 2017
- There are other RFCs covering [[block cipher modes of operation]] and how these ciphers should be used in protocols such as [[IPsec]], [[Op4 KB (600 words) - 23:49, 7 June 2012
- A block cipher defines how a single block is encrypted; a [[block cipher modes of operation| mode of operation]] defines how multiple block encryptions are combined to ...encrypt objects larger than their block size; just choose an appropriate [[Block cipher modes of operation|mode of operation]].53 KB (8,371 words) - 05:48, 8 April 2024
- Any [[block cipher]] can be used to construct a stream cipher; there are [[block cipher modes of operation]] designed for this. Either [[Block_cipher_modes_of_operation#Output_Feedb24 KB (3,851 words) - 05:49, 8 April 2024
- A [[block cipher]] can provide a good pseudo-random sequence; the [[Block cipher modes of operation|modes of operation]] for this are [[Block_cipher_modes_of_operation#Output_23 KB (3,650 words) - 05:49, 8 April 2024
- ...y Payload (ESP). ESP encryption this is done using a [[block cipher]] in [[Block cipher modes of operation | CBC mode]]. In the most used setup, keys are automatically negotiated, an Encryption is done with a [[block cipher]] using [[Block cipher modes of operation | CBC mode]]. The RFCs require support for only two mandatory encryption al40 KB (6,219 words) - 05:49, 8 April 2024
- ...enough. The block cipher itself defines how a single block is encrypted; [[Block cipher modes of operation | modes of operation]] specify how these operations are combined to achieve ...er. In particular, any block cipher can be used as stream cipher in some [[Block cipher modes of operation | modes of operation]]. In general, stream ciphers are faster than block ci52 KB (8,332 words) - 05:49, 8 April 2024
- *[[Block cipher modes of operation/Definition]]15 KB (1,521 words) - 09:02, 2 March 2024